{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T05:14:12Z","timestamp":1733548452476,"version":"3.30.1"},"reference-count":21,"publisher":"Elsevier BV","issue":"1-6","license":[{"start":{"date-parts":[[2000,6,1]],"date-time":"2000-06-01T00:00:00Z","timestamp":959817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2000,6]]},"DOI":"10.1016\/s1389-1286(00)00053-0","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:38:45Z","timestamp":1027651125000},"page":"59-75","source":"Crossref","is-referenced-by-count":86,"title":["Design and implementation of an access control processor for XML documents"],"prefix":"10.1016","volume":"33","author":[{"given":"Ernesto","family":"Damiani","sequence":"first","affiliation":[]},{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"additional","affiliation":[]},{"family":"Stefano Paraboschi","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(00)00053-0_BIB1","unstructured":"AlphaWorks, XML Security Suite, April 1999, http:\/\/www.alphaWorks.ibm.com\/tech\/xmlsecuritysuite."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB2","doi-asserted-by":"crossref","unstructured":"T. Berners-Lee, R. Fielding and L. Masinter, Uniform Resource Identifiers (URI): Generic Syntax, 1998, http:\/\/www.isi.edu\/in-notes\/rfc2396.txt.","DOI":"10.17487\/rfc2396"},{"key":"10.1016\/S1389-1286(00)00053-0_BIB3","unstructured":"F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad and M. Stal, Pattern-Oriented Software Architecture \u2014 A System of Patterns, Wiley, New York, 1996."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB4","unstructured":"S. Castano, M.G. Fugini, G. Martella and P. Samarati, Database Security, Addison-Wesley, Reading, MA, 1995."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB5","doi-asserted-by":"crossref","unstructured":"S. Ceri, S. Comai, E. Damiani, P. Fraternali, S. Paraboschi and L. Tanca, XML-GL: A graphical language for querying and restructuring XML documents, in: Proc. 8th International Conference on the World Wide Web, Toronto, May 1999.","DOI":"10.1016\/S1389-1286(99)00014-6"},{"key":"10.1016\/S1389-1286(00)00053-0_BIB6","doi-asserted-by":"crossref","unstructured":"E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, Securing XML documents, in: Proc. 2000 International Conference on Extending Database Technology (EDBT2000), Konstanz, March 2000 (in press).","DOI":"10.1007\/3-540-46439-5_8"},{"key":"10.1016\/S1389-1286(00)00053-0_BIB7","unstructured":"B. Gladman, C. Ellison and N. Bohm, Digital signatures, certificates and electronic commerce, http:\/\/www.clark.net\/pub\/cme\/html\/spki.html."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB8","unstructured":"S. Jajodia, P. Samarati, V.S. Subramanian and E. Bertino, A unified framework for enforcing multiple access control policies, in: Proc. 1997 ACM International SIGMOD Conference on Management of Data, Tucson, AZ, May 1997."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB9","doi-asserted-by":"crossref","unstructured":"J. Kahan, WDAI: a simple World Wide Web distributed authorization infrastructure, in: Proc. 8th International World Wide Web Conference, May 1999.","DOI":"10.1016\/S1389-1286(99)00027-4"},{"key":"10.1016\/S1389-1286(00)00053-0_BIB10","unstructured":"S. Lewontin and M.E. Zurko, The DCE project: providing authorizations and other distributed services to the World Wide Web, in: Proc. 2nd World Wide Web Conference, October 1994, http:\/\/www.ncsa.uiuc.edu\/SDG\/IT94\/Proceedings\/Security\/lewontin\/Web_DCE_Conf_94.html."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB11","unstructured":"T.F. Lunt, Access control policies for database systems, in: C.E. Landwehr (Ed.), Database Security, II: Status and Prospects, North-Holland, Amsterdam, 1989, pp. 41\u201352."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB12","unstructured":"S. Mazzocchi, Cocoon User Manual, http:\/\/xml.apache.org\/cocoon."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB13","doi-asserted-by":"crossref","unstructured":"J.D. Moffett and M. Sloman, Policies hierarchies for distributed systems management, IEEE Journal of Selected Areas in Communications 11 (9) (1993) 1404\u20131414.","DOI":"10.1109\/49.257932"},{"key":"10.1016\/S1389-1286(00)00053-0_BIB14","doi-asserted-by":"crossref","unstructured":"P. Samarati, E. Bertino and S. Jajodia, An authorization model for a distributed hypertext system, IEEE Transactions on Knowledge and Data Engineering 8 (4) (1996) 555\u2013562.","DOI":"10.1109\/69.536249"},{"key":"10.1016\/S1389-1286(00)00053-0_BIB15","doi-asserted-by":"crossref","unstructured":"Youman, Role-based access control models, IEEE Computer 29 (2) (1996) 38\u201347.","DOI":"10.1109\/2.485845"},{"key":"10.1016\/S1389-1286(00)00053-0_BIB16","unstructured":"World Wide Web Consortium (W3C), Document Object Model (DOM) Level 1 Specification Version 1.0, October 1998, http:\/\/www.w3.org\/TR\/REC-DOM-Level-1."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB17","unstructured":"World Wide Web Consortium (W3C), Document Object Model (DOM) Level 2 Specification Version 1.0., September Working Draft 1999, http:\/\/www.w3.org\/TR\/WD-DOM-Level-2."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB18","unstructured":"World Wide Web Consortium (W3C). Extensible Stylesheet Language (XSL) Specification, April 1999, http:\/\/www.w3.org\/TR\/WD-xsl."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB19","unstructured":"World Wide Web Consortium (W3C), Resource Description Framework (RDF) Model and Syntax Specification, February 1999, http:\/\/www.w3.org\/TR\/REC-rdf-syntax."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB20","unstructured":"World Wide Web Consortium (W3C), XML Path Language (XPath), November 1999, http:\/\/www.w3.org\/TR\/xpath."},{"key":"10.1016\/S1389-1286(00)00053-0_BIB21","doi-asserted-by":"crossref","unstructured":"M.E. Zurko, R. Simon and T. Sanfilippo, A user-centered, modular authorization service built on an RBAC foundation, in: Proc. 20th IEEE Symposium on Security and Privacy, Oakland, May 1999, pp. 57\u201371.","DOI":"10.1109\/SECPRI.1999.766718"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600000530?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600000530?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T15:57:35Z","timestamp":1733500655000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128600000530"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,6]]},"references-count":21,"journal-issue":{"issue":"1-6","published-print":{"date-parts":[[2000,6]]}},"alternative-id":["S1389128600000530"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00053-0","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2000,6]]}}}